Ransomware attacks are on the increase. End Point Security is not enough!

Ransomware attacks are on the increase.

Ransomware Attacks Double and Evolve Year-on-year!

Ransomware cases crossed over 20% around the world in the first half of 2020 itself! Out of 121.2 million recorded ransomware attacks, 79.9 million were recorded in the US and 5.9 million in the UK. (Source: Channel Pro)

This year in 2020, the ransomware attack is one of the major concerning issues among every organization across the globe. This attack blocks the confidential, financial, or sensitive information of an organization by gaining unauthorized access to its network. Cybercriminals demand ransom monies to return access to blocked files or systems.

Security is starting to get less attention due to Covid related workforce reduction. To let your attention on security drop is essentially negligence. This can cost an organization more than its revenue if measures to prevent attacks are not implemented and maintained. With the pandemic situation and new normal of remote working, cybercriminals have become more empowered to deploy new sophisticated ransomware attacks.

What can you do to give yourself a chance of surviving an attack?

No alt text provided for this image

It is reported that 77% of organizations that become victims of an attack have endpoint security already implemented. Having endpoint security and intrusion detection systems is essential, along with user guidelines on how to detect a suspect email or activity. The big issue facing all companies is the human factor. Relying on your users to remain diligent is a flaw in security. Your endpoint protection is only as good as the vulnerabilities known about. What about the next new method of attack? It's impossible to know what lies ahead. It takes one or two organizations to fall victim to a new attack, only then enabling your endpoint security provider to find a cure that can then be implemented to those who have not yet been compromised.

No alt text provided for this image

We can learn a lot from medieval castle defense methods. One effective method a king would implement to fend off attackers is to build a moat around his castle. In itself, the moat is not totally secure, but it does stop a direct attack and gives the King extra time and a chance to find a way to fend off the attackers getting into the castle. Typically there would be archers on top of the castle wall shooting off the attackers. I think you get the picture.

Much like a castle defense, it would enhance your endpoint security if you could build a moat around your sensitive data and systems. When an attack happens the moat would delay the Ransome virus to get into your systems. This assists the archers on the castle wall, in this case, your endpoint security.

Implementing a moat may not be as hard as you think. Creating secure encrypted isolated zones on desktop devices will create the moat. There are many solutions out there to do this. The key take away is, you need to implement different layers of security. Your endpoint security provider may not have the software to create the moat. The link below you can watch my video which expands on the gravity of the issue. I share how opensource Vbox can help address this issue and help you create the moat with minimal disruption.

https://youtu.be/pym1jHUu8-I

Leave a Comment!

No Comments
Article by
Mickey Bharat

Your Gateway to Stay Connected with Your Community Awaits

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
We respect your privacy. Unsubscribe at any time.
For more details, read our Privacy Policy.